BreachVulnerabilityTrainingScreenlockpolicyVirusPasswordSafe ToolEncryptionZero-dayAwarenessTrainingWhalephishingMalwarePhishingRansomwareExploitMulti-factorauthentication(MFA)DarkwebWorm12CharacterPasswordsExtorsionSpearphishingPersonallyidentifiableinformation(PII)IntrusionCompromiseSoftwareupdatesBreachVulnerabilityTrainingScreenlockpolicyVirusPasswordSafe ToolEncryptionZero-dayAwarenessTrainingWhalephishingMalwarePhishingRansomwareExploitMulti-factorauthentication(MFA)DarkwebWorm12CharacterPasswordsExtorsionSpearphishingPersonallyidentifiableinformation(PII)IntrusionCompromiseSoftwareupdates

Cybersecurity Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Breach
  2. Vulnerability
  3. Training
  4. Screen lock policy
  5. Virus
  6. Password Safe Tool
  7. Encryption
  8. Zero-day
  9. Awareness Training
  10. Whale phishing
  11. Malware
  12. Phishing
  13. Ransomware
  14. Exploit
  15. Multi-factor authentication (MFA)
  16. Dark web
  17. Worm
  18. 12 Character Passwords
  19. Extorsion
  20. Spear phishing
  21. Personally identifiable information (PII)
  22. Intrusion
  23. Compromise
  24. Software updates